How to deploy a self-hosted instance of the Passbolt password manager

A password manager can keep your sensitive information in-house. Here’s how to deploy Passbolt to your data center or cloud-hosted service. The post How to deploy a self-hosted instance... Read more »

FIN7 threat actor updated its ransomware activity

Researchers from PRODAFT reveal that the infamous FIN7 threat actor updated its ransomware activities and provide a unique view into the structure of the group. Learn how to protect... Read more »

Manage logins for your team using these password managers

Jack Wallen says these five password managers stand out as must-try in a very crowded field of players. The post Manage logins for your team using these password managers... Read more »

Payroll processing checklist

Some operations and tasks don’t require painstaking attention to detail. Unfortunately, processing payroll isn’t one of them. With sensitive salary and wage information, bank and direct deposit accounts, social... Read more »

Cisco Talos report: Threat actors use known Excel vulnerability

The use of .XLL Excel files by threat actors to infect computers with malware is growing fast. Learn more about this relatively new technique and how to protect from... Read more »

Ransomware, DDoS see major upsurge led by upstart hacker group

Cyber threat actors Cuba and Royal are driving a 41% boom in ransomware and other attacks hitting industry and consumer goods and services. The post Ransomware, DDoS see major... Read more »

Study to ace five cybersecurity certification exams

Dive into CompTIA, NIST, CISSP and more with the online training offered in The 2022 Ultimate Advanced CyberSecurity Professional Certification Bundle. The post Study to ace five cybersecurity certification... Read more »

8 best enterprise accounting software for 2023

Enterprise accounting software is designed for large companies and businesses. Here are the top eight enterprise accounting software suites. The post 8 best enterprise accounting software for 2023 appeared... Read more »

New employee checklist and default access policy

Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. However, a standard set of guidelines which can... Read more »

What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?

Microsoft has open sourced its framework for managing open source in software development. The post What is Microsoft’s Secure Supply Chain Consumption Framework, and why should I use it?... Read more »
Subscribe to our Newsletter